top of page
Protective Group Training

Support Services Training

Support Services Training

Perpetrators often use technology to control, stalk, or harass their victims, making it essential for staff to understand these tactics in order to support victims effectively to remain safe and especially not disclose personal and sensitive location information.​

​​

Technology abuse must be factored into a victim's safety plan. Staff who are trained in these areas can help victims secure their devices, protect their privacy, and avoid online threats. A well-rounded safety plan that includes digital security can help victims feel safer and more in control.

 

Sessions are tailored to the attendees' needs and outcomes as required.​

Topics may include:

  • Understanding Technology Abuse

  • Where we find tech abuse (GPS trackers, Hidden Cameras etc)

  • Digital Security Basics

  • Location and Privacy Settings

  • Detecting and Removing Spyware

  • Safe Social Media Use

  • Effective Support for Victims

  • Legal and Ethical Considerations

  • Intervention

  • Digital Safety Planning

  • Where to seek further help

  • Documenting Tech Abuse

  • ​Keeping Up with Technological Advances

  • Childrens Digitel Safety

Explore our various licenses and insurance policies that ensure the highest level of protection for our clients. We are fully accredited and compliant with industry standards.

A Current Affair | Apple AirTag and how an innocent device can be turned sinister.
ABC News | Technology Abuse | Featuring Protective Group
The Project | Aussies Helping Women Rid Their Homes of Tracking Devices | Featuring Protective Group
ABC Statewide Drive | Technology Abuse | Featuring Protective Group
Channel 7 News | Disturbing ways tech is used to control DV victims | Featuring Protective Group
Protective Group have featured on

Support Services Training may include:

Understanding Modern Tech Abuse Tactics

  • Abusers often exploit technology to extend their control and surveillance over victims. This includes tracking their location through GPS, using spyware, or harassing them via social media and messaging apps. Training ensures staff are aware of these tactics and can recognize when a victim is being digitally abused.

  • Effective Support for Victims

  • Without knowledge of technology abuse, staff may not provide comprehensive support, potentially leaving victims vulnerable to continued control or harassment. Staff need to be able to assist in both emotional and technical aspects, ensuring victims can protect themselves fully.

Safety Planning

  • Technology abuse must be factored into a victim's safety plan. Staff who are trained in these areas can help victims secure their devices, protect their privacy, and avoid online threats. A well-rounded safety plan that includes digital security can help victims feel safer and more in control.

Empowering Victims

  • Training equips staff to educate and empower victims about their own digital safety. Victims often feel helpless in the face of technology abuse, but with proper guidance from staff, they can regain control over their online and technological presence.

Legal and Ethical Considerations

  • Many forms of technology abuse may also be illegal, such as cyberstalking, hacking, and unauthorized surveillance. Staff need to understand how to document these abuses and help victims access legal protections, such as restraining orders that include provisions for digital harassment.

Keeping Up with Technological Advances

  • Technology evolves quickly, and so do the methods of abuse. Training ensures staff stay updated on new tools and strategies abusers may use, as well as on the latest ways to help victims protect themselves.

Forms of Technology Abuse

  • Staff should understand the various ways technology can be used to abuse victims, including:

  • Digital surveillance (e.g., using spyware, hacking into accounts).

  • Harassment and cyberstalking via social media, email, or messaging apps.

  • Location tracking using GPS, mobile apps, or shared family plans.

  • Control over devices (e.g., controlling access to smartphones or computers).

  • Revenge porn and the non-consensual sharing of intimate images.

Assessing for Technology Abuse

  • Staff should be trained on how to screen for signs of technology abuse, such as:

  • Victims receiving threatening messages or being constantly monitored.

  • Devices behaving strangely (e.g., battery draining unusually fast, apps that the victim doesn’t recognize).

  • Victims being aware of things they haven’t shared but the abuser knows (indicating potential spyware).

Digital Safety and Privacy Strategies

  • Securing devices and accounts: Teach victims to secure their devices with strong passwords, enable two-factor authentication (2FA), and be cautious with personal information online.

  • Identifying and removing spyware: Educate staff on how to detect spyware or other monitoring tools on a victim's device and how to safely remove them.

  • Social media privacy: Staff should know how to help victims adjust privacy settings on social media, block abusers, and use reporting mechanisms for harassment or fake accounts.

  • Safety Planning with Technology in Mind

Other Training Courses

Victim Survivor Training

Educating Domestic Violence victims about technology abuse is crucial because perpetrators often exploit technology.

Law Enforcement ​Training

Technology is increasingly being used a tool of control, harassment, and intimidation by perpetrators.

Learning Portal

Our dedicated purpose-built Tech Learning Portal was built to with one purpose- keep victims safe online when they are offline.

Have a Question?

Visit our Help Center! Here, you can find answers to frequently asked questions, shipping information, and general details to assist you. If you need further assistance, feel free to reach out!

Police hold AirTag located by Protective Group

News and Events

Keep up to date with the latest news from Protective Group

Protective Group Online Store

Store

Keeping you safe online and in your home

 

Protective Group are proud to have worked with

bottom of page